{"id":14892,"date":"2013-09-12T16:47:27","date_gmt":"2013-09-12T16:47:27","guid":{"rendered":"http:\/\/business.kaspersky.com\/?p=1019"},"modified":"2020-02-26T10:43:03","modified_gmt":"2020-02-26T15:43:03","slug":"kaspersky-looks-suite-in-the-latest-endpoint-security-report","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/kaspersky-looks-suite-in-the-latest-endpoint-security-report\/14892\/","title":{"rendered":"Kaspersky looks &#8220;Suite&#8221; in the latest Endpoint Security Report"},"content":{"rendered":"<p>In IDC\u2019s latest \u201cWorldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares\u201d* report, Kaspersky Lab has been positioned as the third largest Endpoint Security Suite Vendor with a 13% share of the global market.\u00a0\u00a0This market segment is predicted to be the fastest growing segment of Endpoint Security over the next 5 years.\u00a0IDC points out in the report that \u201cIDC expects the endpoint market to be dominated by integrated endpoint security suites that contain anti-malware, desktop firewall, host intrusion prevention, white listing, advanced heuristics, encryption, and patching. A single agent is easier to install and manage while being able to match the capabilities of individual stand alone products.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/23124249\/Kolodgy_IDC_bw.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/09\/23124249\/Kolodgy_IDC_bw.jpg\" alt=\"\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-17256\"><\/a><\/p>\n<p>\u201cKaspersky Lab\u2019s continued success in gaining corporate customers is in direct relation to its focus on end-users who want integrated suites that are comprised of the right mix of modern technologies,\u201d said Charles Kolodgy, Research Vice President, Security Products, IDC.<\/p>\n<p>It\u2019s important to keep in mind that organizations will not sacrifice security effectiveness in exchange for the benefits of an \u201call-in-one\u201d endpoint security suite.\u00a0 Organizations can expect the security suite to have all of the bells and whistles of the best-of-breed endpoint security products in the market today. These include advance anti-malware, application control, device control, data protection, and mobile device management. It is also critically important for effective solutions to manage all endpoints, be they physical, mobile, or virtual.\u00a0 The challenge of managing this type of environment with point security solutions puts a strain on both resources and budgets.\u00a0 This is where endpoint security suites, such as <a href=\"https:\/\/www.kaspersky.com\/business-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a>, will be positioned to meet the needs of today\u2019s complex IT environment as well as the evolving threat environment.<\/p>\n<p>* IDC_Worldwide Endpoint Security 2013 \u2013 2017 Forecast and 2012 Vendor Shares\u00a0 # 242618<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In IDC\u2019s latest \u201cWorldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares\u201d* report, Kaspersky Lab has been positioned as the third largest Endpoint Security Suite Vendor with a 13% share<\/p>\n","protected":false},"author":234,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2017],"class_list":{"0":"post-14892","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-endpoint-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kaspersky-looks-suite-in-the-latest-endpoint-security-report\/14892\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kaspersky-looks-suite-in-the-latest-endpoint-security-report\/14892\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kaspersky-looks-suite-in-the-latest-endpoint-security-report\/14892\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/endpoint-security\/","name":"endpoint security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/234"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14892"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14892\/revisions"}],"predecessor-version":[{"id":32896,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14892\/revisions\/32896"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}